Ask a question to Desklib · AI bot


Public Key Infrastructure Report

4 Pages1128 Words365 Views

Added on  2019-09-19

BookmarkShareRelated Documents
London Metropolitan UniversityFaculty of Computing (North Campus)Coursework 1 Assignment HeaderSTUDENT REFERENCENUMBER___________________________________________________FAMILY NAMEAND INITIALS (Please print):___________________________________ GRADE ALLOCATED :____________________N.B. All grades are provisional untilconfirmed by theBoard of Examiners.ASSESSOR'S INITIALS:________________________________Module Code:CC5004Module Name:Security in Computing Module Organiser:Dr. Deepthi RatnayakeAssignment no.: 1 of 1Weighting: 30%Date set: Tuesday, October 11, 2016(% of module assessment total, incl. exam)Date and time due: Wednesday, 14 December 2016 3:00 PMSubmit to WebLearnASSESSOR’S COMMENTS1
Public Key Infrastructure Report_1
(i)PLAGIARISMYou are reminded that there exist regulations concerning plagiarism. Extracts from theseregulations are printed overleaf. Please sign below to say that you have read and understandthese extracts:Extracts from University Regulations on Cheating, Plagiarism andCollusionSection 2.3:“The following broad types of offence can be identified and are provided as indicative examples .....(i)Cheating: including taking unauthorised material into an examination; consulting unauthorised material outside the examination hall during the examination; obtaining an unseen examination paper in advance of the examination; copying from another examinee; using an unauthorised calculator during the examination or storing unauthorised material in the memory of a programmable calculator which is taken into the examination; copying coursework.(ii)Falsifying data in experimental results.(iii)Personation, where a substitute takes an examination or test on behalf of the candidate. Both candidate and substitute may be guilty of an offence under these Regulations.(iv)Bribery or attempted bribery of a person thought to have some influence on the candidate’s assessment.(v)Collusion to present joint work as the work solely of one individual.(vi)Plagiarism, where the work or ideas of another are presented as the candidate’s own.(vii)Other conduct calculated to secure an advantage on assessment.(viii)Assisting in any of the above.Some notes on what this means for students:1.Copying another student's work is an offence, whether from a copy on paper or from acomputer file, and in whatever form the intellectual property being copied takes, including text,mathematical notation and computer programs.2.Taking extracts from published sources without attribution is an offence. To quote ideas,sometimes using extracts, is generally to be encouraged. Quoting ideas is achieved by statingan author's argument and attributing it, perhaps by quoting, immediately in the text, his or hername and year of publication, e.g. " e = mc2 (Einstein 1905)". A reference section at the end ofyour work should then list all such references in alphabetical order of authors' surnames. (Thereare variations on this referencing system which your tutors may prefer you to use.) If you wish toquote a paragraph or so from published work then indent the quotation on both left and rightmargins, using an italic font where practicable, and introduce the quotation with an attribution.School of Computing, FLSC2
Public Key Infrastructure Report_2

Found this document preview useful?

Related Documents
CS6P05 - Broadcasting System

MATI3006 Numeracy 1 Coursework Brief Spring 2018

Critique of Ridley's 'Emma Bovary' Theory on Female Orgasm Evolution